U.S. intelligence officials say a Russia-backed hacking group has compromised some state and local government computer systems since at least September and exfiltrated data. So far, however, the attackers do not appear to have attempted to otherwise interfere with or disrupt those networks.
Researchers have uncovered a fresh phishing campaign that mimics the automated messages of the popular business communication platform Microsoft Teams in an attempt to harvest users' Office 365 login credentials.
The operators behind the LockBit ransomware strain use automation tools and techniques that help the malware quickly spread through a compromised network and also assist in picking specific targets, according to Sophos.
Voter information on as many as 186 million Americans was being offered for sale in an online forum, according to Trustwave. The information apparently came from public sources as well as data leaks.
Breaches are all too common today as determined cyber criminals have become better organized and more targeted in their attacks. In many cases, a C-level executive loses their job as a result. That doesn't have to be you or your organization.
The right security testing solution is key to keeping you safe. From...
We live in a new era of digital innovation. The service sector
financial institutions (SF) invest billions of dollars in technologies every year
new and emerging designed to make banks more efficient
internal and more responsive to the changing demands of the
market. As part of this effort to improve the
customer...
According to the latest Global Risk Report 2019 of the World Economic Forum, the
fraud / data theft is in the top 5 of global risks, and in 2019 it is ranked by
ahead of cyberattacks. As such, precisely prioritizing protection from attacks based on
impersonation of persons is required for the protection of clients...
The latest edition of the ISMG Security Report analyzes the U.S. indictment against Russian hackers who were allegedly behind NotPetya. Also featured: A discussion of nation-state adversaries and how they operate; an update on Instagram privacy investigation.
The White House are Twitter are both debunking claims by a Dutch ethical hacker that he accessed President Donald Trump's Twitter account earlier this month by guessing the password, enabling him to obtain full privileges and capture screenshots.
U.S. officials have blamed Iran for sending a barrage of fake emails and videos to American voters with a Democratic Party affiliation as part of a campaign to push misinformation and sow confusion in the days before the presidential election.
As part of an ongoing effort to crack down on Iranian terrorist groups' internet activities, the U.S. government this week seized two domains associated with a group that was involved in a disinformation campaign.
An indictment unsealed this week demonstrates the degree to which Western intelligence agencies have apparently been able to infiltrate the Russian intelligence apparatus to trace attacks back to specific agencies - and individual operators. Shouldn't Russian spies have better operational security?
The IRS Criminal Investigation Cyber Crimes Unit is waging a battle against the use of cryptocurrency for financing terrorists and other money-laundering activities. Agents Chris Janczewski and Jon Gebhart describe recent cryptocurrency-related takedowns.
Security talent is scarce in organizations of all sizes.
According to ISACA's latest research, 62% of managers believe their organizations' cybersecurity teams are understaffed, and 70% think that fewer than half of cybersecurity applicants are well qualified. How to overcome this unfortunate reality?
Start by...
Fraudsters are sending phishing emails with messages about the Coinbase cryptocurrency exchange to Microsoft Office 365 users in an attempt to take over their inboxes and gain access to data, according to the security firm KnowBe4.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.